×

Obfuscating data stored in a dispersed storage network

  • US 8,683,231 B2
  • Filed: 12/01/2011
  • Issued: 03/25/2014
  • Est. Priority Date: 12/27/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for execution by a computing device, the method comprises:

  • dispersed storage error encoding secret data in accordance with first dispersed storage error encoding parameters to produce at least one set of encoded secret slices;

    dispersed storage error encoding data in accordance with second dispersed storage error encoding parameters to produce a plurality of sets of encoded data slices;

    determining an inter-dispersing function for outputting the sets of encoded secret slices and the plurality of sets of encoded data slices, wherein the determining the inter-dispersing function including;

    identifying a first decode threshold and a first pillar width based on the first dispersed storage error encoding parameters; and

    identifying a second decode threshold and a second pillar width based on the second dispersed storage error encoding parameters, wherein the first decode threshold is less than or equal to a difference between the second pillar width and the second decode threshold; and

    for a set of the plurality of encoded data slices;

    identifying at least one encoded data slice of the set of encoded data slices based on the inter-dispersing function, wherein the identifying the at least one encoded data slice including identifying a number of encoded data slices of the set of encoded data slices as the at least one encoded data slice to be equal to or greater than the first decode threshold;

    replacing the at least one encoded data slice with at least one encoded secret slice of the at least one set of encoded secret slices to produce a mixed set of encoded slices, wherein the replacing the at least one encoded data slice including replacing the number of encoded data slices with at least a first decode threshold number of encoded secret slices of a set of the least one set of encoded secret slices; and

    outputting the mixed set of encoded slices.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×